You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/reference-architecture/diagrams/network/bring-your-own-ip-space-to-cloudflare.mdx
+21-19Lines changed: 21 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,41 +12,43 @@ updated: 2024-10-24
12
12
13
13
## Introduction
14
14
15
-
Cloudflare brings security and performance to our customers' digital estates. However, one of the challenges with proxying services is that interactions on the web (for example, DNS queries, web requests to Internet or SaaS services, etc.) that go to Cloudflare will appear to the world as coming from Cloudflare IP space. This can create challenges for some enterprises.
15
+
Cloudflare brings security and performance to our customers' digital estates. However, one of the characteristics of proxying services is that interactions on the web that go to Cloudflare (DNS queries or requests to SaaS providers, for example) will appear to the world as coming from the Cloudflare IP space. This can create challenges for some enterprises.
16
16
17
-
For example, partners or other B2B relationships may use public IP space owned by a customer for attestation and attribution in various transactions. They may look at the resolved address for a public hostname (for example, [www.example.com](http://www.example.com)) and expect that IP to match a specific range or address known to be owned by the customer.
17
+
For example, partners or other B2B relationships may use the public IP space owned by a customer for attestation and attribution in various transactions. They may look at the resolved address for a public hostname (for example, `www.example.com`) and expect that IP to match a specific range or address known to be owned by the customer.
18
18
19
-
Cloudflare allows customers to Bring Your Own IP (BYOIP) which allows enterprises to bring their IP space to Cloudflare, thus gaining the security and performance of the Cloudflare platform while still appearing to the rest of the world via their own public IP space. This reference architecture diagram will highlight the different ways customers can bring their IP space to the Cloudflare network and the benefits that are achieved.
19
+
[Bring Your Own IP (BYOIP)](/byoip/)allows enterprises to bring their IP space to Cloudflare, thus gaining the security and performance of the Cloudflare platform while still appearing to the rest of the world via their own public IP space. This reference architecture diagram highlights the different ways customers can bring their IP space to the Cloudflare network and the benefits that are achieved.
20
20
21
21
## BYOIP scenario one \- Cloudflare proxy services
22
22
23
-
The default behavior when a DNS query is made to a Cloudflare proxied hostname will be to return one of Cloudflare's [default anycast IP addresses](https://www.cloudflare.com/ips/). The traffic is then accelerated, protected, and if not served by Cloudflare cache, sent to the customer's origin server.
23
+
The default behavior when a DNS query is made to a Cloudflare proxied hostname will be to return one of Cloudflare's [default anycast IP addresses](https://www.cloudflare.com/ips/). The traffic is then accelerated, protected, and, if not served by Cloudflare cache, sent to the customer's origin server.
24
24
25
-
In the diagram below, the customer wants to proxy traffic through Cloudflare's application services platform, but wants any DNS queries to return an IP address that is owned by that customer but still benefits from Cloudflare's anycast network. There are two different network ranges used in this example.
25
+
In the diagram below, instead of the default behavior, traffic will proxy through Cloudflare's application services platform but DNS queries will return an IP address that is owned by the customer while also benefiting from Cloudflare's anycast network.
26
26
27
-
- 152.3.15.0/24 \- Customer owned IP range that will be associated with the Cloudflare network.
28
-
- 152.3.14.0/24 \- Customer owned IP range that will continue to be associated with their origin network.
27
+
There are two different network ranges used in this example:
28
+
29
+
-`152.3.15.0/24`\- Customer owned IP range that will be associated with the Cloudflare network.
30
+
-`152.3.14.0/24`\- Customer owned IP range that will continue to be associated with their origin network.
29
31
30
32

31
33
32
-
1. In order for Cloudflare to respond to DNS queries with addresses from the customer's space, a Letter of Agency must be provided by the customer to Cloudflare, so that it can be provisioned and advertised by Cloudflare. This example address space (152.3.15.0/24) must be dedicated for Cloudflare's configuration and not used anywhere within the customer environment.
33
-
2. The Cloudflare DNS configuration for the origin server [www.abc.com](http://www.abc.com) is configured with the IP address 152.3.14.10/32.
34
-
3. A DNS query for [www.abc.com](http://www.abc.com) is made.
35
-
4. Cloudflare returns an address from the customer's space that was previously configured from BYOIP space provided by the customer. In this case, the response was 152.2.15.200 which is a part of the /24 prefix of 152.2.15.0/24.
36
-
5. The eyeball sends a request to 152.2.15.200 which is routed to the Cloudflare edge.
37
-
6. Cloudflare proxies the connection, using the SNI (www.abc.com) to determine the actual origin IP, 152.3.14.10. The request is then routed through Cloudflare's proxy services, such as DDoS protection, Web Application Firewall, and Bot Management.
38
-
7. Successful requests are sent to origin (if not served by cache) to 152.3.14.10 with a source IP of the Cloudflare edge.
34
+
1. In order for Cloudflare to respond to DNS queries with addresses from the customer's space, a Letter of Agency (LOA) must be provided by the customer to Cloudflare, so that the addresses can be provisioned and advertised. This address space (in the example, `152.3.15.0/24`) must be dedicated for Cloudflare's configuration and not used anywhere within the customer environment.
35
+
2. The Cloudflare DNS configuration for the origin server `www.abc.com` is configured with the IP address `152.3.14.10/32`.
36
+
3. A DNS query for `www.abc.com` is made.
37
+
4. Cloudflare returns an address from the customer's space that was previously configured from a BYOIP space provided by the customer. In this case, the response was `152.2.15.200`, which is a part of the `/24` prefix of `152.2.15.0/24`.
38
+
5. The eyeball sends a request to `152.2.15.200` which is routed to the Cloudflare edge.
39
+
6. Cloudflare proxies the connection, using the SNI (`www.abc.com`) to determine the actual origin IP, `152.3.14.10`. The request is then routed through Cloudflare's proxy services, such as DDoS protection, Web Application Firewall, and Bot Management.
40
+
7. Successful requests are sent to origin (if not served by cache) to `152.3.14.10` with a source IP of the Cloudflare edge.
39
41
40
42
## BYOIP scenario two \- network DDoS protection
41
43
42
-
Cloudflare is well known for its DDoS mitigation services protecting public websites and APIs, and the same technologies can also be used to protect entire networks. Cloudflare's Magic Transit service offers a cloudbased network DDoS mitigation service for our customers' public IP space.
44
+
Cloudflare is well known for its DDoS mitigation services protecting public websites and APIs. The same technologies can also be used to protect entire networks. Cloudflare's [Magic Transit](/magic-transit/) service offers a cloud-based network DDoS mitigation service for our customers' public IP space.
43
45
44
-

46
+

45
47
46
-
1. In order for Cloudflare to attract traffic destined for customer network prefixes, a Letter of Agency must be provided by the customer to Cloudflare, so that it can be provisioned and advertised by Cloudflare to the Internet.
47
-
2. Once provisioned, Cloudflare will advertise the customer prefix(es) attracting traffic destined for those networks to the Cloudflare edge.
48
+
1. In order for Cloudflare to attract traffic destined for customer network prefixes, a Letter of Agency (LOA) must be provided by the customer to Cloudflare, so that the network prefixes can be provisioned and advertised.
49
+
2. Once provisioned, Cloudflare will advertise the customer prefixes to the Internet, attracting traffic destined for those networks to the Cloudflare edge.
48
50
3. All traffic destined for those prefixes is routed to the Cloudflare edge.
49
-
4. DDoS traffic is mitigated at the edge and legitimate traffic is directed back to customer networks via [tunnels](/magic-wan/) or [Cloudflare Network Interconnect](/network-interconnect/) (CNI) on ramps to the customer environment.
51
+
4. DDoS traffic is mitigated at the edge and legitimate traffic is directed back to customer networks via [tunnels](/magic-wan/), or via[Cloudflare Network Interconnect](/network-interconnect/) (CNI) on ramps to the customer environment.
50
52
51
53
More detailed information about Magic Transit capabilities can be found in the [Magic Transit Reference Architecture](/reference-architecture/architectures/magic-transit/).
0 commit comments